Most companies react after the damage has been done and by the time they know their security has been breached, there is little they can do to minimize the damage. Being proactive assumes that everything that can be hacked will be hacked and involves putting measures in place to ensure this does not happen, or at the very least minimize the chances of it happening. Having a list of every hackable asset your company has, start with the crucial systems and work your way down, starting with crucial systems that make them money or help them run their businesses.”]

